Описание
Windows NTLM V1 Elevation of Privilege Vulnerability
Меры по смягчению последствий
Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigations might apply in your situation:
Set the LmCompatabilityLvl to its maximum value (5) for all machines. This will prevent the usage of the older NTLMv1 protocol, while still allowing NTLMv2. Please see Network security: LAN Manager authentication level for more information.
FAQ
According to the CVSS metric, the attack vector is network (AV:N) and the attack complexity is low (AC:L). What does that mean for this vulnerability?
The attack vector is Network (AV:N) because this vulnerability is remotely exploitable and can be exploited from the internet. The attack complexity is Low (AC:L) because an attacker does not require significant prior knowledge of the system and can achieve repeatable success with the payload against the vulnerable component.
Обновления
Продукт | Статья | Обновление |
---|---|---|
Windows Server 2022, 23H2 Edition (Server Core installation) | ||
Windows 11 Version 24H2 for ARM64-based Systems | ||
Windows 11 Version 24H2 for x64-based Systems | ||
Windows Server 2025 | ||
Windows Server 2025 (Server Core installation) |
Показывать по
Возможность эксплуатации
Publicly Disclosed
Exploited
Latest Software Release
DOS
EPSS
9.8 Critical
CVSS3
Связанные уязвимости
Windows NTLM V1 Elevation of Privilege Vulnerability
Уязвимость реализации протокола NTLMv1 операционных систем Windows, позволяющая нарушителю повысить свои привилегии
EPSS
9.8 Critical
CVSS3